13.3.2(a)—13.3.2(a)
>Control Description
on the basis of the risk assessment carried out pursuant to point 2.1, lay down and use security perimeters to protect areas where network and information systems and other associated assets are located;
Ask AI
Configure your API key to use AI features.